[1]* -Introducing The SQL Injection Vuln:
.SQL injection attacks are known also as SQL insertion it's in the form of executing some querys in the database and getting acces to informations (SQL Vesion, Number & Names of tables and columns,some authentification infos,ect...)

[2]* -Exploiting Sql Injection Vuln :
.Before proceeding to the exploitation of sql injections we have to checking for this vulnerability, so we have an exemple

Error That we search!! now, we know that the second character is char(105) and that is 'i' with the ascii converter. We have 'ci' now from the first and the second charactets our tutorial draws to the close! Thanks you for reading and i hope that you have understand SQL Injection and exploitations of this vulnerability .